ATO
Authority to Operate
What is the first step to reporting a computer incident or spillage?
Contact your ISSO
A hacker that exploits individuals for money, prestige or incriminating information.
What is Black Hat
The operating system that is used for penetration testing
What is kali linux
RMF
Risk Management Framework
If classified information were released, which classification level would result in "Exceptionally grave damage to national security"?
A. Confidential
B. Secret
C. Top Secret
C. Top Secret
An ethical hacker.
What is White Hat
What is a physical or logical device used to capture keystrokes.
What is Keylogger
CIA
What is Confidentiality, Integrity, and Availability
When should you plug unauthorized devices on a governmental system?
Never
The kind of hacker is one that exploits computers for political gain.
What is hacktivist
Cyber security uses multiple layers of defenses for protecting information. If one layer is defeated then the next one should catch it.
defense in depth
NCDOC
Navy Cyber Defense Operations Command
When should you install or download unauthorized software on a governmental system?
Never
This type of hacker has been accused of meddling in our national elections
What is State sponsored
This is a phrase meaning the security discipline that requires a particular user system, or application be given no more privilege than necessary to perform its function
What is the Principle of Least Privilege.
SAAR_N
SYSTEM AUTHORIZATION ACCESS REQUEST NAVY
Your Department Information Officer (DIO)?
Michael Liskiewicz
an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.
What is a Red Team
What is prevents one party from denying the actions it has carried out.
What is Non repudiation
The A dep logo has a 8 bit binary number 01000001. What base 10 number or Hexadecimal number or ASCII charter does this represent?
Base 10= 65
Hexadecimal= 41
ASCII= A